source: MondoRescue/branches/3.2/mindi-busybox/archival/bbunzip_test3.sh@ 3232

Last change on this file since 3232 was 2725, checked in by Bruno Cornec, 13 years ago
  • Update mindi-busybox to 1.18.3 to avoid problems with the tar command which is now failing on recent versions with busybox 1.7.3
  • Property svn:eol-style set to native
  • Property svn:executable set to *
File size: 769 bytes
Line 
1#!/bin/sh
2# Leak test for gunzip. Watch top for growing process size.
3# In this case we look for leaks in "concatenated .gz" code -
4# we feed gunzip with a stream of .gz files.
5
6i=$PID
7c=0
8while true; do
9 c=$((c + 1))
10 echo "Block# $c" >&2
11 # RANDOM is not very random on some shells. Spice it up.
12 i=$((i * 1664525 + 1013904223))
13 # 100003 is prime
14 len=$(( (((RANDOM*RANDOM)^i) & 0x7ffffff) % 100003 ))
15
16 # Just using urandom will make gzip use method 0 (store) -
17 # not good for test coverage!
18 cat /dev/urandom \
19 | while true; do read junk; echo "junk $c $i $junk"; done \
20 | dd bs=$len count=1 2>/dev/null \
21 | gzip >xxx.gz
22 cat xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz xxx.gz
23done | ../busybox gunzip -c >/dev/null
Note: See TracBrowser for help on using the repository browser.